{"title":"High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology","authors":"Yun Tang, Lulu Cheng, Wanli Lyv, Z. Yin","doi":"10.48550/arXiv.2211.02801","DOIUrl":"https://doi.org/10.48550/arXiv.2211.02801","url":null,"abstract":"Reversible data hiding in encrypted domain(RDH-ED) can not only protect the privacy of 3D mesh models and embed additional data, but also recover original models and extract additional data losslessly. However, due to the insufficient use of model topology, the existing methods have not achieved satisfactory results in terms of embedding capacity. To further improve the capacity, a RDH-ED method is proposed based on the topology of the 3D mesh models, which divides the vertices into two parts: embedding set and prediction set. And after integer mapping, the embedding ability of the embedding set is calculated by the prediction set. It is then passed to the data hider for embedding additional data. Finally, the additional data and the original models can be extracted and recovered respectively by the receiver with the correct keys. Experiments declare that compared with the existing methods, this method can obtain the highest embedding capacity.","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128323009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Donghua Wang, Rangding Wang, Li Dong, Diqun Yan, Yiming Ren
{"title":"Efficient Generation of Speech Adversarial Examples with Generative Model","authors":"Donghua Wang, Rangding Wang, Li Dong, Diqun Yan, Yiming Ren","doi":"10.1007/978-3-030-69449-4_19","DOIUrl":"https://doi.org/10.1007/978-3-030-69449-4_19","url":null,"abstract":"","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127950937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Machine Learning Approach to Approximate the Age of a Digital Image","authors":"Robert Jöchl, A. Uhl","doi":"10.1007/978-3-030-69449-4_14","DOIUrl":"https://doi.org/10.1007/978-3-030-69449-4_14","url":null,"abstract":"","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125436065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A HEVC Steganalysis Algorithm Based on Relationship of Adjacent Intra Prediction Modes","authors":"Henan Shi, Tanfeng Sun, Zhaohong Li","doi":"10.21203/rs.3.rs-67799/v1","DOIUrl":"https://doi.org/10.21203/rs.3.rs-67799/v1","url":null,"abstract":"\u0000 Currently, many High Efficiency Video Coding (HEVC) video steganography algorithms based on Intra Prediction Mode (IPM) have been proposed. However, the existing IPM-based video steganalysis algorithms are almost designed for H.264/AVC videos, without considering the unique coding techniques in HEVC, which is the latest video codec standard. Thus, it is of significant value to study IPM-based steganalysis for HEVC videos. In this paper, the general process of IPM-based HEVC steganography is modelled for the first time, and we find that the basic distortion existing in the change of the relationships between each embedded IPM and the adjacent IPMs. By exploiting these weaknesses, we propose a novel IPM steganalysis algorithm based on the Relationship of Adjacent IPMs (RoAIPM) feature. In detail, the RoAIPM is extracted by generating different directional Gray-Level Co-occurrence Matrixes (GLCMs) and texture characteristics of three refilled matrixes: MPM-IPM matrix, Left-IPM matrix and Up-IPM matrix. Experimental results show that, the proposed RoAIPM feature is very sensitive to the little change introduced by IPM-based steganography. Regardless of whether the feature is after dimension reduction or not, in various coding conditions, the proposed steganalysis can both present a well higher detection accuracy against the latest IPM-based HEVC steganography methods and achieve the lowest computational complexity compared with the state-of-the-art works.","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128961424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reversible Data Hiding Based on Partitioning the Prediction Values","authors":"Haihang Wu, Fangjun Huang","doi":"10.1007/978-3-030-43575-2_16","DOIUrl":"https://doi.org/10.1007/978-3-030-43575-2_16","url":null,"abstract":"","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121292041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Steganalytic Approach for AMR Steganography Based on Block-Wise of Pulse Position Distribution and Neighboring Joint Density","authors":"Chen Gong, Xianfeng Zhao","doi":"10.1007/978-3-030-43575-2_26","DOIUrl":"https://doi.org/10.1007/978-3-030-43575-2_26","url":null,"abstract":"","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132529546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Asad Malik, Hongxia Wang, A. N. Khan, Yanli Chen, Yi Chen
{"title":"A Novel Lossless Data Hiding Scheme in Homomorphically Encrypted Images","authors":"Asad Malik, Hongxia Wang, A. N. Khan, Yanli Chen, Yi Chen","doi":"10.1007/978-3-030-43575-2_18","DOIUrl":"https://doi.org/10.1007/978-3-030-43575-2_18","url":null,"abstract":"","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132993619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weakly Supervised Adaptation to Re-sizing for Image Manipulation Detection on Small Patches","authors":"L. Darmet, Kai Wang, François Cayre","doi":"10.1007/978-3-030-43575-2_8","DOIUrl":"https://doi.org/10.1007/978-3-030-43575-2_8","url":null,"abstract":"","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122324743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Median Filtering Detection of Small-Size Image Using AlexCaps-Network","authors":"Guiduo Duan, Jiayu Miao, Tianxi Huang","doi":"10.1007/978-3-030-43575-2_10","DOIUrl":"https://doi.org/10.1007/978-3-030-43575-2_10","url":null,"abstract":"","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114474562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}